1 - 6
- International Conference on Inventive Systems and Control (7th : 2023 : Coimbatore, India)
- Singapore : Springer, [2023]
- Description
- Book — 1 online resource (xxviii, 881 pages) : illustrations (chiefly color)
- Summary
-
- Intro
- Preface
- Contents
- Editors and Contributors
- Optimal Placement of Phasor Measurement Units Considering Channel Limits Under Various Contingencies
- 1 Introduction
- 2 Problem Formulation
- 2.1 Measurement Redundancy
- 2.2 Zero Injection Bus
- 2.3 Single PMU Loss or Single Line Outage
- 2.4 Channel Limits
- 3 Optimal Placement of Phasor Measurement Unit
- 4 Result Analysis
- 5 Conclusion
- References
- Adaptive Deep Recurrent Neural Network-Based COVID-19 Healthcare Data Prediction for Early Risk Prediction
- 1 Introduction
- 2 Related Works
- 2.1 Problem Identification Factors
- 3 Proposed Method
- 3.1 Preprocessing
- 3.2 Intrinsic Covid Defect Rate
- 3.3 Relative Cluster-Intensive Feature Selection
- 3.4 Adaptive Deep Vectorized Recursive Neural Network
- 4 Experimental Results and Discussion
- 5 Conclusion
- References
- Maximum Decision Support Regression-Based Advance Secure Data Encrypt Transmission for Healthcare Data Sharing in the Cloud Computing
- 1 Introduction
- 1.1 The Novelty of This Paper
- 2 Related Work
- 2.1 Problem Factors
- 3 Proposed Method
- 3.1 Node Efficiency Hit Rate (NEHR)
- 3.2 Efficient Spider Optimization Scheme
- 3.3 Maximum Decision Support Regression
- 3.4 Advanced Secure Data Encrypt Transmission (ASDET)
- 4 Result and Discussion
- 5 Conclusion
- References
- Routing Integrity Mechanism to Prevent Wormhole Attacks in Vehicular Adhoc Networks
- 1 Introduction
- 2 Literature
- 3 Delay-Sensitive Message Integrity Mechanism to Isolate the Wormhole Attacks
- 4 Result Analysis
- 5 Conclusions
- References
- A Detailed Analysis on Spam Emails and Detection Using Machine Learning Algorithms
- 1 Introduction
- 2 Types of Spam
- 2.1 Understanding How Spammers Gets Address
- 2.2 Problems with Spamming
- 2.3 Types of Spam Filters
- 2.4 Factors to Determine if Email Is Spam or Ham
- 2.5 Working of Gmail Spam Filter
- 2.6 Working of Outlook Spam Filter
- 2.7 Working of Yahoo Spam Filter
- 3 Literature Review
- 4 Analysis of Machine Learning Algorithms
- 5 Conclusion
- References
- Advanced Encryption Standard-Based Encryption for Secured Transmission of Data in Cognitive Radio with Multi-channels
- 1 Introduction
- 2 Literature Survey
- 2.1 Related Works
- 3 Proposed MPC Protocol for Channel Allocation
- 3.1 Optimized LSTM Classifier
- 3.2 SU-SMO Algorithm
- 4 Suggested Secure Data Transmission Using AES Protocol
- 4.1 Channel Sensing Phase
- 4.2 Contention Phase
- 4.3 Data Transmission Phase
- 4.4 AES
- 4.5 Encryption
- 4.6 Decryption
- 5 Results and Discussion
- 5.1 Simulation Procedure
- 5.2 Performance Evaluation with Regard to Average Backoff
- 5.3 Performance Evaluation with Regard to Sensing Delay
- 5.4 Performance Evaluation with Regard to Throughput
- 5.5 Performance Evaluation with Regard to Channel Utilization
- 5.6 Convergence Analysis
- 6 Conclusion
- References
- Multi Energy-Harvesting Smart Water Meter Design for Underground Water Pipeline Leakage Detection
- International Conference on Evolutionary Computing and Mobile Sustainable Networks (2020 : Bangalore, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource
- Summary
-
- Optimal Resource Sharing amongst Device-to-Device Communication using Particle Swarm Algorithm.- Real Time Human Locator and Advance Home Security Appliances.- A Novel Implementation of Haptic Robotic Arm.- Design of Book Recommendation System Using Sentiment Analysis.- Review of Python for Solar Photovoltaic Systems.- Key Stroke Dynamics for User Verification.- The Role of Predictive Data Analytics in Retailing.- Improved Scheduling Algorithm for Load Balancing in Cloud Computing.- Generating Automobile Images Dynamically from Text Description.- Generating Automobile Images Dynamically from Text Description.- Identification of Online Auction Bidding Robots using Machine Learning.- Analysis of Attention Deficit Hyperactivity Disorder using Various Classifiers.- Generating Feasible Path Between Path Testing and Data Flow Testing.- Parking Management System Using Internet of Things.- Binomial Logistic Regression Resource Optimized Routing In MANET.- Homo Sapiens Sapiens Diabetes Mellitus Detection and Classification.- Improved Logistic Map based Algorithm for Biometric Image Encryption.- Accuracy Analysis of Similarity Measures in Surprise Framework.- Tunable Access Control for Data Sharing in Cloud.- Conceptual Online Education using E-Learning Platform of Cloud Computing.- Efficient Deployment of Web Application in Serverless Environment.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Inventive Systems and Control (6th : 2022 : Coimbatore, India)
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource.
- Summary
-
- Wind Turbine Alarm Management with Artificial Neural Networks.- Convolutional Neural Networks as a Quality Control in 4.0 Industry for Screws and Nuts.- Proposal of an Efficient Encryption Algorithm for Securing Communicated Information.- Discernment of Unsolicited Internet Spamdexing using Graph Theory.- Unique Authentication System in End-To-End Encrypted Chat Application.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Evolutionary Computing and Mobile Sustainable Networks (2021 : Bangalore, India).
- Singapore : Springer, [2022]
- Description
- Book — 1 online resource (1039 pages) : illustrations (chiefly color).
- Summary
-
- Improved Grey wolf Optimization based Feature selection and classification using CNN for Diabetic Retinopathy detection.- Feature Selection Using Modified Sine Cosine Algorithm with COVID-19 Dataset.- Blood Cell Image Denoising based on Tunicate Rat Swarm Optimization with Median Filter.- A Hybrid Approach for Deep Noise Suppression using Deep Neural Networks.- Human Health Care Systems Analysis for Cloud Data Structure of Biometric System using ECG Analysis.- Data mining for Solving Medical Diagnostics Problems.- Classification of Diabetic Retinopathy using Ensemble of Machine Learning Classifiers with IDRID Dataset.- Epileptic Seizure Prediction Using Geometrical Features Extracted From HRV Signal.- An Extensive Survey on Outlier Prediction using Mining and Learning Approaches.- Performance Comparison of Data Security Strategies in Fog Computing.- Design and Simulation of a Direct-PSK Based Telecommand Receiver for Small Satellite
- Analysis of Data Aggregation and Clustering Protocol in Wireless Sensor Networks using Machine Learning.- DetecSec : A Framework to Detect and Mitigate ARP Cache Poisoning Attacks.- PAPR Reduction in SDR based OFDM System.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Inventive Systems and Control (5th : 2021 : Coimbatore, India)
- Singapore : Springer, [2021]
- Description
- Book — 1 online resource : illustrations (chiefly color)
- Summary
-
- Chapter 1. Knowledge Graphs in Recommender Systems.-
- Chapter 2. Cyberbullying Detection on Social Media using SVM.-
- Chapter 3. Ultraviolet Radiation in Healthcare Applications: A Decades-old Game Changer Technology in COVID'19.-
- Chapter 4. Multi-agent Ludo Game Collaborative Path Planning based on Markov Decision Process.-
- Chapter 5. An Analysis of Epileptic Seizure Detection and Classification using Machine Learning based Artificial Neural Network.-
- Chapter 6. Improving Image Resolution On Surveillance Images using SRGAN.-
- Chapter 7. Smart City: Recent Advances and Research Issues.-
- Chapter 8. HOUSEN: Hybrid Over-Under Sampling and Ensemble Approach for Imbalance Classification.-
- Chapter 9. E-Pro: Euler Angle and Probabilistic Model for Face Detection and Recognition.-
- Chapter 10. Classification of Covid-19 Tweets Using Deep Learning Techniques.-
- Chapter 11. Applied Classification Algorithms used in Data Mining During the Vocational Guidance Process in Machine Learning.-
- Chapter 12. Meta-heuristic Algorithm for the Global Optimization: Intelligent Ice Fishing Algorithm.-
- Chapter 13. Progression of EEG-BCI Classification Techniques : A Study.-
- Chapter 14. Cuckoo Scheduling Algorithm for Lifetime Optimization in Sensor Networks of IoT.-
- Chapter 15. Design & Development of an Automated Snack Maker with CNN based Quality Monitoring.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- International Conference on Machine Learning and Autonomous Systems (2021 : Tamil Nadu, India)
- Singapore : Springer, 2022.
- Description
- Book — 1 online resource.
- Summary
-
- Utilization of Sensors for Energy Generation using Pressure or Vibrations.- Modeling and Optimization of Discrete Evolutionary Systems of Information Security Management in a Random Environment.- Gender Identification using Ensemble Linear Discriminant Analysis Algorithm based on Facial Features.- Software Stack for Autonomous Vehicle: Motion Planning.- Transformers for Speaker Recognition.- Real-time Face Mask Detection using MobileNetV2 Classifier.- Spoken Language Identification for Native Indian Languages using Deep Learning Techniques.- Smart Attendance System using Machine Learning Algorithms.- Novel Approach to Phishing Detection Using ML and Visual Similarity.- Text Summarization of Articles using LSTM and Attention-based LSTM.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.